Which of the following is replayed during wireless authentication to exploit a weal key
infrastructure?
A.
Preshared keys
B.
Ticket exchange
C.
Initialization vectors
D.
Certificate exchange
Which of the following is replayed during wireless authentication to exploit a weal key
infrastructure?
Which of the following is replayed during wireless authentication to exploit a weal key
infrastructure?
A.
Preshared keys
B.
Ticket exchange
C.
Initialization vectors
D.
Certificate exchange
I believe “initialization vectors” is the answer. There is no such thing as ticket when talking about wireless.